[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <201706292347.uVgX84TR%fengguang.wu@intel.com>
Date: Fri, 30 Jun 2017 00:21:57 +0800
From: kbuild test robot <lkp@...el.com>
To: Lawrence Brakmo <brakmo@...com>
Cc: kbuild-all@...org, netdev <netdev@...r.kernel.org>,
Kernel Team <kernel-team@...com>,
Blake Matheny <bmatheny@...com>,
Alexei Starovoitov <ast@...com>,
Daniel Borkmann <daniel@...earbox.net>,
David Ahern <dsa@...ulusnetworks.com>
Subject: Re: [PATCH net-next v4 01/16] bpf: BPF support for sock_ops
Hi Lawrence,
[auto build test WARNING on net-next/master]
url: https://github.com/0day-ci/linux/commits/Lawrence-Brakmo/bpf-BPF-cgroup-support-for-sock_ops/20170629-203719
config: xtensa-allyesconfig (attached as .config)
compiler: xtensa-linux-gcc (GCC) 4.9.0
reproduce:
wget https://raw.githubusercontent.com/01org/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# save the attached .config to linux build tree
make.cross ARCH=xtensa
All warnings (new ones prefixed by >>):
In file included from include/linux/cgroup-defs.h:20:0,
from include/linux/cgroup.h:26,
from include/net/netprio_cgroup.h:17,
from include/linux/netdevice.h:47,
from include/net/sock.h:51,
from include/linux/tcp.h:23,
from include/net/tcp.h:24,
from net//ipv6/netfilter/nf_socket_ipv6.c:13:
include/net/tcp.h: In function 'tcp_call_bpf':
>> include/linux/bpf-cgroup.h:86:25: warning: the address of 'sock_ops' will always evaluate as 'true' [-Waddress]
if (cgroup_bpf_enabled && (sock_ops) && (sock_ops)->sk) { \
^
>> include/net/tcp.h:2047:8: note: in expansion of macro 'BPF_CGROUP_RUN_PROG_SOCK_OPS'
ret = BPF_CGROUP_RUN_PROG_SOCK_OPS(&sock_ops);
^
--
In file included from include/linux/cgroup-defs.h:20:0,
from include/linux/cgroup.h:26,
from include/net/netprio_cgroup.h:17,
from include/linux/netdevice.h:47,
from include/net/sock.h:51,
from include/linux/tcp.h:23,
from net//netfilter/ipvs/ip_vs_core.c:33:
include/net/tcp.h: In function 'tcp_call_bpf':
>> include/linux/bpf-cgroup.h:86:25: warning: the address of 'sock_ops' will always evaluate as 'true' [-Waddress]
if (cgroup_bpf_enabled && (sock_ops) && (sock_ops)->sk) { \
^
>> include/net/tcp.h:2047:8: note: in expansion of macro 'BPF_CGROUP_RUN_PROG_SOCK_OPS'
ret = BPF_CGROUP_RUN_PROG_SOCK_OPS(&sock_ops);
^
net//netfilter/ipvs/ip_vs_core.c: In function 'ip_vs_sched_persist':
net//netfilter/ipvs/ip_vs_core.c:399:1: warning: the frame size of 1072 bytes is larger than 1024 bytes [-Wframe-larger-than=]
}
^
net//netfilter/ipvs/ip_vs_core.c: In function 'ip_vs_new_conn_out':
net//netfilter/ipvs/ip_vs_core.c:1199:1: warning: the frame size of 1056 bytes is larger than 1024 bytes [-Wframe-larger-than=]
}
^
--
In file included from include/linux/cgroup-defs.h:20:0,
from include/linux/cgroup.h:26,
from include/net/netprio_cgroup.h:17,
from include/linux/netdevice.h:47,
from include/net/sock.h:51,
from include/linux/tcp.h:23,
from net/netfilter/ipvs/ip_vs_core.c:33:
include/net/tcp.h: In function 'tcp_call_bpf':
>> include/linux/bpf-cgroup.h:86:25: warning: the address of 'sock_ops' will always evaluate as 'true' [-Waddress]
if (cgroup_bpf_enabled && (sock_ops) && (sock_ops)->sk) { \
^
>> include/net/tcp.h:2047:8: note: in expansion of macro 'BPF_CGROUP_RUN_PROG_SOCK_OPS'
ret = BPF_CGROUP_RUN_PROG_SOCK_OPS(&sock_ops);
^
net/netfilter/ipvs/ip_vs_core.c: In function 'ip_vs_sched_persist':
net/netfilter/ipvs/ip_vs_core.c:399:1: warning: the frame size of 1072 bytes is larger than 1024 bytes [-Wframe-larger-than=]
}
^
net/netfilter/ipvs/ip_vs_core.c: In function 'ip_vs_new_conn_out':
net/netfilter/ipvs/ip_vs_core.c:1199:1: warning: the frame size of 1056 bytes is larger than 1024 bytes [-Wframe-larger-than=]
}
^
vim +86 include/linux/bpf-cgroup.h
70 __ret; \
71 })
72
73 #define BPF_CGROUP_RUN_PROG_INET_SOCK(sk) \
74 ({ \
75 int __ret = 0; \
76 if (cgroup_bpf_enabled && sk) { \
77 __ret = __cgroup_bpf_run_filter_sk(sk, \
78 BPF_CGROUP_INET_SOCK_CREATE); \
79 } \
80 __ret; \
81 })
82
83 #define BPF_CGROUP_RUN_PROG_SOCK_OPS(sock_ops) \
84 ({ \
85 int __ret = 0; \
> 86 if (cgroup_bpf_enabled && (sock_ops) && (sock_ops)->sk) { \
87 typeof(sk) __sk = sk_to_full_sk((sock_ops)->sk); \
88 if (sk_fullsock(__sk)) \
89 __ret = __cgroup_bpf_run_filter_sock_ops(__sk, \
90 sock_ops, \
91 BPF_CGROUP_SOCK_OPS); \
92 } \
93 __ret; \
94 })
---
0-DAY kernel test infrastructure Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all Intel Corporation
Download attachment ".config.gz" of type "application/gzip" (50369 bytes)
Powered by blists - more mailing lists